Senior Back End Engineer - Golang InformationSecurity Team 6-Month Contract 600- 650 per day - Inside IR35 Hybrid - London/Remote (3 days on-site per week) The role: Our global media and consumer technology client is seeking a Senior Back End Engineer to join their InformationSecurity team for an initial 6-month contract. This … role focuses on building and maintaining internal tools used for large-scale web application testing , automation , and scraping , helping to improve the security and resilience of digital platforms used worldwide. This is a fast-paced, high-impact role suited to experienced engineers who are confident working autonomously and contributing to complex systems with minimal onboarding. The ideal candidate will … Responsibilities Creating tools that emulate malicious activity in order to detect and fix weaknesses in web platforms. Build and enhance microservice-based automation pipelines that test and strengthen the security of web apps. Design, develop, and maintain scalable back end systems for internal web crawling and scraping tools. Collaborate with engineering and security stakeholders across global teams. Deliver More ❯
City of London, London, Lime Street, United Kingdom
PCR Digital
Senior Back End Engineer - Golang InformationSecurity Team 6-Month Contract £600-£650 per day - Inside IR35 Hybrid - London/Remote (3 days on-site per week) The role: Our global media and consumer technology client is seeking a Senior Back End Engineer to join their InformationSecurity team for an initial 6-month contract. This … role focuses on building and maintaining internal tools used for large-scale web application testing , automation , and scraping , helping to improve the security and resilience of digital platforms used worldwide. This is a fast-paced, high-impact role suited to experienced engineers who are confident working autonomously and contributing to complex systems with minimal onboarding. The ideal candidate will … Responsibilities Creating tools that emulate malicious activity in order to detect and fix weaknesses in web platforms. Build and enhance microservice-based automation pipelines that test and strengthen the security of web apps. Design, develop, and maintain scalable back end systems for internal web crawling and scraping tools. Collaborate with engineering and security stakeholders across global teams. Deliver More ❯
Network Engineer ACTIVE TS/SCI CLEARANCE with FS poly REQUIRED TO BE CONSIDERED FOR THIS POSITION The INFOSEC and COMSEC security requirements for the network add to the complexity of these positions. Positions at this level are responsible for performing moderately complex network designs; performing upgrades to limited segments of the network, and performing routine network operations and … homeland and cyber security. TENICA provides knowledgeable and experienced subject matter experts to perform a variety of professional services, logistics and supply chain management, crisis prevention and response, and information technology solutions to solve dynamic security challenges. Founded in 2008 and based in Alexandria, Virginia, TENICA is a Service Disabled Veteran Owned, Woman Owned, Small Business (SDVOB and More ❯
and execute lifecycle activities for IT networking portfolios. Operate and maintain Cisco enterprise-level hardware and software solutions. Implement secure encrypted networking devices and ensure compliance with U.S. Government Information Assurance and Security standards. Manage and troubleshoot network-based security technologies, including firewalls and ACLs. Monitor network performance proactively and identify optimization opportunities. Collaborate with IT and … Associate (CCNA) Routing and Switching and/or CCNA Data Center. 5+ years with enterprise-level Cisco systems (e.g., IOS, NX-OS, ACI) and technologies (Voice, Video, Routing, Switching, Security). 3+ years with Cisco Routing/Switching technologies (e.g., BGP, EIGRP, LACP, HSRP, OSPF, QoS, VRF). 3+ years with encrypted networking devices (e.g., Taclanes, Border Guards). … with Cisco Unified Communications Manager (CUCM), TMS, and VCS. Familiarity with SolarWinds Network Configuration Manager (NCM). Working knowledge of Cisco data center and enterprise WAN/LAN design. INFOSEC-aligned configuration and management experience with Cisco ASA and similar devices. Advanced troubleshooting expertise and issue resolution methodologies. Familiarity with firewall, proxy, and VPN setup, testing, and sustainment. Exposure to More ❯
requires all candidates to currently possess an active Top-Secret SCI Clearance with a Polygraph. This position is not an opportunity to be sponsored or nominated for a government security clearance. Minimum Qualifications: • A current Top-Secret/SCI government security clearance with polygraph is required • Eight (8) years of experience as a DNEA and a bachelors degree. … following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). (U) Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … major. Experience: (U) Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a More ❯
Role: Principal GRC Analyst (Cyber Security) Salary: Up to £66,500 + excellent pension and benefits Location: Leeds (Hybrid) I am currently recruiting a fantastic role for an organisation that play a crucial role in the UK healthcare industry, an organisation that make a positive impact on society. The role will play a key role in the organisation's … a team of 2 and taking the lead on key GRC activities. The organistion offer supportive environment and they truly value work/life balance. Key Responsibilities Own the InformationSecurity Assurance framework and programme. Design and perform reviews to provide assurance of informationsecurity controls effectiveness. Be responsible for establishing and implementing the informationsecurity and technology risk management programme. Identify, engage and manage 3rd party organisations to ensure appropriate security assurance activities are conducted. Lead on Secure by Design activities to ensure business and technical changes meet security requirements. Liaise with other bodies to contribute to the maturing of cyber security practices across the Health and Social care More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Fruition Group
Role: Principal GRC Analyst (Cyber Security) Salary: Up to £66,500 + excellent pension and benefits Location: Leeds (Hybrid) I am currently recruiting a fantastic role for an organisation that play a crucial role in the UK healthcare industry, an organisation that make a positive impact on society. The role will play a key role in the organisation's … a team of 2 and taking the lead on key GRC activities. The organistion offer supportive environment and they truly value work/life balance. Key Responsibilities Own the InformationSecurity Assurance framework and programme. Design and perform reviews to provide assurance of informationsecurity controls effectiveness. Be responsible for establishing and implementing the informationsecurity and technology risk management programme. Identify, engage and manage 3rd party organisations to ensure appropriate security assurance activities are conducted. Lead on Secure by Design activities to ensure business and technical changes meet security requirements. Liaise with other bodies to contribute to the maturing of cyber security practices across the Health and Social care More ❯
Position requires a TS/SCI with CI Poly security clearance prior to consideration. Individual will perform fingerprinting duties to include enrollment, un-enrollment, and scheduling. 25% travel will be required. Maintain tracking records and filing systems, archives files as necessary. Recommend new administrative support processes. Execute security in and out processing requirements. Issue security related equipment … records, receipts, or supplies. Maintain a schedule of appointments for a manager and/or offices. Schedule polygraph testing. Answer security related telephone calls, direct calls to the appropriate branch or office, and take messages. Research, record, and report statistical analysis for historical and planning purposes. Provide security support for passing, verifying, and receiving clearances, confirming Sensitive Compartmented … Information (SCI) security eligibility, processing visitor requests, requests for badges, and various certifications. Update security data, run inquiries, provide quality control, develop reports using various IC and/or DOD databases. Provide support coordinating, tasking and managing security action responses government and other industry organizations. Maintain and update appropriate security related databases. Provide administrative/ More ❯
for medium and largescale telecommunication infrastructures. Assists telecommunications end users, telecommunications operations personnel, and telecommunications strategic program management with network interfaces. Qualifications A Master's degree in Computer Science, Information Assurance, InformationSecurity Systems Engineering, or a related discipline from an accredited college or university and ten (10) years of relevant professional experience providing Network Engineering support … and training commensurate with network engineering curriculums or a Bachelor's degree from an accredited college or university in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline and Twelve (12) years of relevant professional experience providing Network Engineering support. Fifteen (15) years of relevant experience providing Network Engineering support may be substituted for a … Bachelor's degree or Twenty (20) years for a Master's degree. Certification: An Information Assurance Technical (IAT) level III baseline certification as defined by DoD 8570.01-M is required. Cisco certification is required. More ❯
AMERICAN SYSTEMS is an employee-owned federal government contractor supporting national priority programs through our strategic solutions in the areas of Information Technology, Test & Evaluation, Program Mission Support, Engineering & Analysis, and Training. Responsibilities As a Computer Scientist with AMERICAN SYSTEMS you will have the opportunity to do the following: Analyze and refine systems requirements. Translate systems requirements into applications … to test applications. Assure software and systems quality and functionality.Integrate hardware and software components. Write and maintain program documentation. Evaluate new applications software technologies. Ensure the rigorous application of informationsecurity/information assurance policies, principles, and practices to the delivery of application software services. Qualifications Active Secret Clearance U.S. Citizenship Required for the purposes of obtaining …/holding a U.S. security clearance Master's Degree in Computer Science, Management Information Systems, Software Engineering, Electrical Engineering, or quantitative discipline, such as Mathematics, or Civil Engineering At least twelve (12) continuous years' experience in information systems or network design and implementation in broad-based information technology settings using contemporary information systems tools and More ❯
Job Title: Lecturer in Cyber Security (HE) Location: Birmingham Salary: £38,249 - £42,882 per annum - AC2 Job type: Permanent, Full-time/Part-time UCB is an equal opportunities employer. We are TEF rated Silver, with a Good Ofsted rating. The Role: Ready to inspire the next generation of tech professionals? Whether you have teaching experience in HE … Lecturer, you will deliver inspiring and inclusive teaching that supports all students in achieving their full potential. This role will focus on teaching computing programmes areas including BSc Cyber Security, where you will help shape and guide future leaders in the field. You will prioritise practical application and demonstration over theoretical instruction, ensuring students gain real-world skills and … including professional qualification sponsorship A variety of salary sacrifice schemes including technology and cycle. Heavily-subsidised on-site car parking in central Birmingham Free on-site gym membership Extra Information: All applicants for employment at the University will be expected to demonstrate an understanding of the principles of Safeguarding and the PREVENT agenda in the context of further and More ❯
Are you ready to take the next step in your career as an OT Security Engineer? Join one of the world's leading IT services, consulting, and business solutions organization. Founded in 1968, the company consistently ranks among the top global IT service providers. With a presence in over 50 countries, the company has built a reputation for delivering … high-quality technology services across industries including banking, healthcare, telecommunications, and retail. The leading consultancy firm is looking for a skilled OT Security Engineer to play a critical role in safeguarding IT and operational technology environments, working closely with key stakeholders to mitigate risks and ensure compliance. Want to be part of a team that thrives in excellence and … shines? Feel free to reach out and apply today! Responsibilities: Identify and assess informationsecurity risks, ensuring mitigation strategies are in place across the business. Provide security guidance within governance processes to ensure IT solutions are secure and compliant. Collaborate with IT management teams to implement security best practices and appropriate technologies. Work proactively to address More ❯
such as Interact, Impact, Asset, Discover, Deploy, Comply, Patch, Threat Response, and Trend modules Configure and manage Discover and Connect modules to identify, manage, and maintain endpoints and allow information sharing Work closely with team members on improving Tanium operational status across the enterprise Analyze and refine EDR detection rules to minimize false positives while maintaining a high level … of security effectiveness Address unmanaged Tanium endpoints, maintain applicable maintenance windows for managed endpoints Configure and manage trend boards and sources Coordinate with IT teams to identify, configure, and manage intel for Indicators of Compromise (IoCs), following guidance as required by external authorities Coordinate with IT teams and components to support Automated Continuous Endpoint Monitoring (ACEM) Coordinate and assist … with cybersecurity reviews, including generation of security artifacts, implementation statements, standard operating procedures, POA&M, and CONOPS Ability to support of West Coast hours Requirements: Active DoD Top Secret Clearance - Tier 5 Single Scope Background Investigation (SSBI) Active DoD 8570 IAT Level III certification (CASP+CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, or CCSP) Hands-on experience More ❯
will you do? Responsible for performing moderately complex network designs; performing upgrades to limited segments of the network, and performing routine network operations and maintenance (O&M). Address INFOSEC and COMSEC security requirements for the network. Work involves oversight and technical direction of system-wide issues requiring advanced levels of understanding of network theory and the specific enterprise … which network technologies can be utilized to meet current and future organizational needs. Do you have what it takes? TS/SCI with poly required 6+ years experience Cyber Security/Computer and Network Defense overall technical and operational effectiveness of capabilities … BS Degree Ability to performing moderately complex network designs; performing upgrades to limited segments of the network, and performing routine network operations and maintenance (O&M) Knowledge to address INFOSEC and COMSEC security requirements for the network Experience in oversight and technical direction of system-wide issues requiring advanced levels of understanding of network theory and the specific enterprise More ❯
a high visibility requirement with the Customer, integrating the latest IT commercial off the shelf (COTS) hardware and software. Additionally, you will be at the forefront; • Developing and enforcing security protocols for secure, multi-party capabilities for users across various domain classification. • Work with various users to collect requirements for data centers. These users are across the Intelligence Community … process improvement. • As a Linux specialist you will focus on mission capabilities and Linux based COTS applications Requirements • Active TS/SCI with appropriate Poly Clearance • Must have a Security + certification. • Eight (8) years' experience as an IT Engineer in programs and contracts of similar scope, type and complexity is required. Bachelor's degree in System Engineering, Computer … Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required. • A Master's degree in Computer Science, Information Assurance, InformationSecurity System Engineering, or related discipline may be substituted for two (2) years of experience, reducing the requirement to six (6) years of IT Engineering experience. o Four More ❯
high visibility requirement with the Customer, integrating the latest IT commercial off the shelf (COTS) hardware and software. ? Additionally, you will be at the forefront in developing and enforcing security protocols for secure, multi-party capabilities for users across various domain classification. You will work with various users to collect requirements for data centers. These users are across the … process improvement. Specifically, as a Linux specialist you will focus on mission capabilities and Linux based COTS applications. Strong Linux system administration skills General Red Hat Linux system administration, security patching, OS upgrades, troubleshooting problems, managing package install/upgrades Required: TS/SCI w/POLYGRAPH BEFORE CONSIDERATION Must have a Security + certification. Demonstrated experience with … CENTOS Operating systems with the ability to configure, monitor and troubleshoot. Manage installation, maintenance and support of technical infrastructures, hardware and system software components. Education & Experience: Must have a Security + certification. Eight (8) years' experience as an IT Engineer in programs and contracts of similar scope, type and complexity is required. Bachelor's degree in System Engineering, Computer More ❯
clients, team members, and partners, we all achieve greater success. Credence has an upcoming need for an Acquisition Intelligence Analyst who will be primarily responsible for supporting Air Force Security Assistance and Cooperation Directorate Force Military Sales (AFSAC - FMS) at Wright Patterson Air Force Base, OH. AFSAC (Air Force Foreign Military Sales) is a team that develops Air Force … cases to enable global coalitions and support priorities of the six geographic U.S. combatant commands. Their mission is to deliver airpower capabilities to strengthen international partnerships and advance national security This opening is slated to kick off 1 July 2025. Responsibilities include, but are not limited to the duties listed below Provide intelligence analytic/technical support to FMS … the design, collection, collation, and reporting of the team's measures of effectiveness against the annual action plan/goals/objectives. Accurately sourcing, reviewing, synthesizing, and aggregating classified information by searching known databases, existing intelligence reporting, and other organizational information to present timely and accurate classified data in a format consumable via a standardized product. Reviewing and More ❯
join our team of qualified, diverse individuals. This is part of a team that ensures the customer's ability to provide mission critical intelligence and successful use of its information technology (IT) networks worldwide. This role is onsite in Ft Belvoir, VA. Required Security Clearance: Top Secret/SCI (willing to sit for CI Poly) Required Certifications: Required … Security Environment Certification: CompTIA Security+ CE or equivalent Required Computing Environment certification: VMware Certified Technical Associate or equivalent to start. Required Computing Environment certification: VMware Certified Professional or higher can obtain within 180 days of hire date. Principal Duties and Responsibilities: Operate and sustain the on-going daily operational use of a VMware infrastructure including updating, testing and deploying … and deployment of new software releases. Manage and administer physical and virtual servers, primarily Windows and Linux servers Support and management of server virtualization, server provisioning, physical server maintenance, security compliance and daily operations Manage VMware vSphere, with emphasis on automation, and enterprise storage and backup system administration, installation, and on-going maintenance experience. Maintain server lifecycle - provisioning, maintenance More ❯
create our culture by living our values in our day-to-day interactions with our patients and teammates. Job Summary The Director, IT&S provides the vision, leadership and information systems in support of both business and clinical operations for management for site/facility within the Community Hospital division. This role requires strong project management and customer service … operations Develop policies and procedures in the Service Delivery department to manage access and the availability of data as a resource for the organization and promote the sharing of information across clinical and business teams and platforms Develops the development of information systems strategy to align with the business plans of the Community Hospital facility in partnership with … efficiency/improvements or solve operational procedures Recommend changes/upgrades to existing systems and new software and hardware acquisition Provides advice on evaluation, selection, implementation and maintenance of information systems, ensuring appropriate investment in strategic and operational systems Communicate regularly with leaders in the organization about IT priorities, implementations, changes, and upgrades Ensures that end users are trained More ❯
and international organizations. With over 60 years of experience, Amentum supports the execution of complex and critical missions by providing global logistics and stability operations, technical services and national security solutions to customers around the world. Amentum has a workforce of approximately 50,000 people in over 80 countries on all seven continents and is headquartered in Chantily, VA … in accordance with regulations, policies, and processes. Other duties as assigned. Required Qualifications: A minimum of five years of experience (within the last seven years) with all phases of Information Assurance (IA) and accreditation processes, securing IT systems and services using Government and industry IA standards, policies, and guidelines. A minimum of five years of experience (within the last … seven years) managing and leading a security operations staff with skills applicable to a project environment similar in size and scope referenced in this TO A minimum of five years of experience (within the last seven years) successfully managing informationsecurity risks including completing the entire Access and Authorize (A&A) process and receiving Authority to Operate More ❯
Role Overview: The Security Consultant/Architect would be providing security architecture, consulting and strategic direction to clients as part of the Enterprise Security Initiatives for a global System Integrator. Identity and Access Management as well as general security will be an area of experience allowing you to Identify and evaluate business risks & threats and internal … SOX compliance programs, managing audits and compliance against regulatory/standards/leading practices (i.e. SOX, GLBA, Clause 49, FFIEC, etc.) and establishing control environments Work closely with CSO & Security director to define Security Strategy and build and nurture positive working relationships with clients Consulted and provided solutions in the areas of enterprise business/technology strategy, Identity … Access Management, Data Security, business process optimization/re-engineering, enterprise infrastructure security design & optimization Designed and implemented solutions for enterprise security infrastructure, security, identity management/entitlement, disaster recovery, business continuity strategy and planning, fault tolerant infrastructure, contingency planning, crisis management, application/infrastructure integrity. The Architect/Consultant is a senior technologist that plays More ❯
modified hardware and operating systems and applications software. Manage accounts, network rights, and access to systems and equipment. Manage systems resources including performance, capacity, availability, serviceability, and recoverability, implementing security procedures and tools. Develop and document systems administration standard operating procedures. Resolve hardware/software interface and interoperability problems. Ensuring systems availability, functionality, integrity, and efficiency. Maintain systems configuration. … 10.9 Manage the installation and integration of systems fixes, updates, and enhancements; and/or ensuring the rigorous application of informationsecurity/information assurance policies, principles, and practices in the delivery of systems administration services. Implement DISA Security Technical Implementation Guides (STIGs) across a Windows environment. Conduct Windows Server and Windows OS vulnerability management, patching … Perform system administration tasks such as user management (creation, support, and deletion of user accounts), software installation, server monitoring, server backup operations, operating system, and application troubleshooting, and computer security for all operating systems in use within the environment. Provide system administration services for all servers, storage area networks (SANs), and server hosted applications. Manage all servers; perform log More ❯
assisting with collection methodology. We welcome all interested and qualified candidates to apply for this challenging opportunity. Advantage SCI is a Small Disabled Veteran Owned Small Business providing national security and critical defense support services. We believe our employees are our greatest assets with expertise that solves clients' problems to meet their mission goals and objectives. Clearance Requirement: Active … procedures. Respond to RFIs, prepare and present briefings, as required. Perform analysis to accomplish battle damage assessment (BDA), produce BDA products, and assist with combat assessments. Adhere to strict security protocols to safeguard classified information and ensure information security. This position is contingent on funding and may not be filled immediately. This position may require flexible support More ❯
assisting with collection methodology. We welcome all interested and qualified candidates to apply for this challenging opportunity. Advantage SCI is a Small Disabled Veteran Owned Small Business providing national security and critical defense support services. We believe our employees are our greatest assets with expertise that solves clients' problems to meet their mission goals and objectives. Clearance Requirement: Active … procedures. Responds to RFIs, prepare and present briefings, as required. Performs analysis to accomplish battle damage assessment (BDA), produce BDA products, and assist with combat assessments. Adheres to strict security protocols to safeguard classified information and ensure information security. This position is contingent on funding and may not be filled immediately. This position may require flexible support More ❯
comprehensive documentation, including user guides, system operations, installation manuals, and testing documentation. The ideal candidate will have excellent writing and editing skills with the ability to translate complex technical information into easy-to-understand materials. Responsibilities: Assist in preparing and maintaining operations documentation, user guides and manuals and technical publications research highly technical subject matter, organize information from … multiples sources, and express technical information in written form that is comprehensible to a wide audience of readers Produce defense acquisition documentation, user manuals, training manuals, and other documentation utilized by the end-user community of DoD electronic equipment and systems Interpret engineering and maintenance drawings, operational procedures to understand and blend large quantities of computer related information … an accredited college or university is required. In lieu of a Bachelor's degree, four (4) years of additional Technical Writing experience may be substituted. Desired: Familiarity with Network Security Services and Chief InformationSecurity Officer processes and procedures. This position is contingent on funding and may not be filled immediately. However, this position is representative of More ❯